front pagenewsNorth Korean hackers Lazarus Group targets crypto wallets with fake NFTs

North Korean hackers Lazarus Group targets crypto wallets with fake NFTs

Published on

spot_img

Key Summary:
Lazarus Group hackers used fake NFT games to steal crypto wallet credentials.
The malware in DeTankZone exploits a Chrome vulnerability for remote access.
Social engineering helps the Lazarus Group target large audiences.


Yerevan (CoinChapter.com) – North Korean hackers known as Lazarus Group used fake NFT games to exploit Chrome vulnerabilities to steal crypto wallet credentials. Security analysts at Kaspersky Lab reported that the cyberattack exploited a zero-day vulnerability in Google Chrome to gain unauthorized access to user devices. The attackers targeted the blockchain game clone DeTankZone and advertised it as a play-to-earn (P2E) multiplayer online battle arena (MOBA) game to lure unsuspecting players.


Lazarus Group’s malware was embedded in the source code of the DeTankZone NFT game.
securelist.com
Lazarus Group embedded malware directly into gaming websites
detankzone.com
This allowed them to infect any device that interacted with the site. According to Kaspersky, the malicious script bypassed Chrome's security protections. It exploited a vulnerability in Chrome's V8 JavaScript engine, enabling remote code execution. In this way, the hackers deployed the Manuscrypt malware and took control of user devices. This access allowed them to obtain sensitive crypto wallet credentials without downloading or other typical interactions.
Kaspersky discovers Chrome vulnerability, Google releases patch
After discovering the vulnerability, Kaspersky Lab immediately notified Google. Soon after, Google released a security update to address the vulnerability, even though the attackers had already accessed several devices. The incident raised concerns about the wider impact of such attacks on cryptocurrency users and businesses around the world.
Boris Larin and Vasily Berdnikov, security analysts at Kaspersky, noted that the Lazarus Group used advanced social engineering techniques to create an illusion of authenticity for the game. They set up a professional website and high-level LinkedIn account to establish credibility. In addition, the attackers used social platforms such as X and LinkedIn to use AI-generated marketing materials and invited well-known cryptocurrency influencers to promote the fake NFT game. This comprehensive approach attracted a wide audience and increased the effectiveness of the attack.
Lazarus Group has a long history of cryptocurrency theft
The fake NFT game was not just a cover, it was a fully operational game. It included detailed game elements such as logos, 3D graphics, and user interfaces. However, anyone who visited the site was at serious risk. The Lazarus Group embedded the Manuscrypt malware in the game website. This malware harvested sensitive crypto wallet credentials, allowing them to conduct large-scale cryptocurrency theft.
The Lazarus Group has long been targeting the cryptocurrency industry. Notably, between 2020 and 2023, investigator ZachXBT linked them to more than 25 hacks with a total loss of more than $200 million. Therefore, this history highlights the group's continued focus on cryptocurrency theft. In addition, they often rely on vulnerabilities and social engineering to succeed.


Lazarus Group’s $200 million cryptocurrency laundering operation. Source:
ZachXBT
Major Cryptocurrency Theft Linked to Lazarus Group
Over the years, the Lazarus Group has conducted many major cryptocurrency theft operations. For example, in 2022, they reportedly stole more than $600 million in Ether (ETH) and USD Coin (USDC) through the Ronin Bridge hack. In addition, the U.S. Treasury Department has linked them to multiple cyberattacks against financial institutions and global cryptocurrency platforms.
In September 2023, data from 21.co (the parent company of 21Shares) showed that the organization still held more than $47 million in various cryptocurrencies. These included assets such as Bitcoin (BTC), Binance Coin (BNB), Avalanche (AVAX), and Polygon (MATIC).
Furthermore, the report estimates that the Lazarus Group has amassed more than $3 billion in digital assets between 2017 and 2023. Their influence on the cryptocurrency industry is enormous, highlighting their continued focus on the cryptocurrency market.
Social engineering is key to Lazarus Group’s cyber strategy
It is worth noting that the success of this attack relied heavily on social engineering. Through carefully crafted promotional materials, AI-generated graphics, and credible-looking LinkedIn profiles, the Lazarus Group successfully disguised their fake NFT games as legitimate games, attracting cryptocurrency enthusiasts. This sophisticated approach circumvents common cybersecurity defenses and expands the range of potential victims.

Latest Articles

SUI显现看涨信号,能否超越比特币?

NOIDA (CoinChapter.com) — 比特币(BTC)在5月面临保持上涨势头的困难,尽管它在5月初一度接近98,000美元的水平。截止5月6日,全球领先的加密货币目前仅上涨了1.2%,并...

由于对欺诈的担忧,SEC推迟了对莱特币ETF的决定,导致LTC价格下跌

美国证券交易委员会(SEC)推迟对Canary Capital提议的莱特币(LTC)交易所交易基金(ETF)决定美国证券交易委员会(SEC)已推迟对Canary Capital提议的莱特币(LTC)交...

Solayer崩盘:因退出骗局指控,LAYER暴跌47%

NOIDA (CoinChapter.com) — Solayer价格崩盘引发关注Solayer,一个基于Solana的再质押项目,在不到48小时内经历了近一半市值的急剧修正后,成为了焦点。2025年...

由于肯尼亚高等法院下令删除生物识别数据,Worldcoin (WLD) 价格暴跌10%

Worldcoin遭遇肯尼亚重大法律挫折2025年5月6日,Worldcoin在肯尼亚遭遇了重大的法律挫折。肯尼亚高等法院法官阿布里利·罗斯琳(Aburili Roselyne)裁定,Worldcoi...

More Articles

SUI显现看涨信号,能否超越比特币?

NOIDA (CoinChapter.com) — 比特币(BTC)在5月面临保持上涨势头的困难,尽管它在5月初一度接近98,000美元的水平。截止5月6日,全球领先的加密货币目前仅上涨了1.2%,并...

由于对欺诈的担忧,SEC推迟了对莱特币ETF的决定,导致LTC价格下跌

美国证券交易委员会(SEC)推迟对Canary Capital提议的莱特币(LTC)交易所交易基金(ETF)决定美国证券交易委员会(SEC)已推迟对Canary Capital提议的莱特币(LTC)交...

Solayer崩盘:因退出骗局指控,LAYER暴跌47%

NOIDA (CoinChapter.com) — Solayer价格崩盘引发关注Solayer,一个基于Solana的再质押项目,在不到48小时内经历了近一半市值的急剧修正后,成为了焦点。2025年...
en_GBEnglish